DADABox / revisiting-iot-device-identification
Data and code for TMA 2021 paper "Revisiting IoT Device Identification"
☆7Updated 2 years ago
Alternatives and similar repositories for revisiting-iot-device-identification:
Users that are interested in revisiting-iot-device-identification are comparing it to the libraries listed below
- IoT SENTINEL : Automated Device-Type Identification for Security Enforcement in IoT☆42Updated 6 years ago
- ☆26Updated last year
- SDN based system to translate MUD profile to flow rules using Faucet as a controller☆11Updated 5 years ago
- Detection of IoT devices infected by malwares from their network communications, using federated machine learning☆37Updated 8 months ago
- A Behavior-Based Device Identification Method for the IoT☆51Updated 8 months ago
- Contact: Alexander Hartl, Maximilian Bachl, Fares Meghdouri. Explainability methods and Adversarial Robustness metrics for RNNs for Intru…☆16Updated 3 years ago
- This program allow you to extract some features from pcap files.☆38Updated last year
- ☆15Updated last year
- Code for the paper "FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications" [NDSS '21]☆33Updated 4 years ago
- cool project☆19Updated 4 years ago
- Privacy Preserving Collaborative Encrypted Network Traffic Classification (Differential Privacy, Federated Learning, Membership Inference…☆122Updated last year
- pcapML standardizes network traffic analysis datasets by directly encoding metadata information into raw traffic captures☆25Updated 2 years ago
- nPrint provides a generalizable data representation for network packets that works directly with machine learning techniques☆103Updated 2 years ago
- An anonymized mobile traffic dataset published by Chen's team (National University of Defense Technology)☆38Updated last year
- Multitask Learning Approach for Network Traffic Classification☆55Updated 5 years ago
- AI/ML and Cybersecurity: The Emperor has no Clothes☆18Updated last year
- Enhancing Robustness Against Adversarial Examples in Network Intrusion Detection Systems☆17Updated 4 years ago
- FL-based intrusion detection system development using model averaging.☆35Updated 2 years ago
- Interpreting and Improving Deep Learning-based Anomaly Detection in Security Applications (CCS'21)☆71Updated 3 years ago
- ☆57Updated 2 years ago
- ☆39Updated last year
- Accurate Mobile-App Fingerprinting Using Flow-level Relationship with Graph Neural Networks☆14Updated 2 years ago
- This repo contains implementation of IP2Vec model which is used for learning similarities between IP Addresses☆12Updated last year
- FS-Net: A Flow Sequence Network For Encrypted Traffic Classification☆44Updated 4 years ago
- 🛜→🖼️ Replication of the model set forth in "FlowPic: Encrypted Internet Traffic Classification is as Easy as Image Recognition" by Tal …☆13Updated 4 years ago
- This is a paper list about Machine Learning for IDSes☆88Updated 4 months ago
- This is a Python version of CICFlowmeter-V4.0 (formerly known as ISCXFlowMeter) - an Ethernet traffic Bi-flow generator and analyzer for …☆68Updated 3 years ago
- This is a dataset of 5G network traffic for use with machine learning tools to benchmark attack detection capabilities for multiple diffe…☆57Updated 2 months ago
- Training of a simple Neural Network model as an Intrusion Detection System for Cybersecurity defense using Federated Learning with the Te…☆15Updated 2 years ago
- An automatic packet crafting tool for evading learning-based NIDS☆77Updated 3 years ago